{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T11:24:44Z","timestamp":1745666684910,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033162"},{"type":"electronic","value":"9783642033179"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03317-9_8","type":"book-chapter","created":{"date-parts":[[2009,7,11]],"date-time":"2009-07-11T09:16:40Z","timestamp":1247303800000},"page":"122-138","source":"Crossref","is-referenced-by-count":4,"title":["Cryptanalysis of RadioGat\u00fan"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Fuhr","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Peyrin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-76900-2_8","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"E. Andreeva","year":"2007","unstructured":"Andreeva, E., Neven, G., Preneel, B., Shrimpton, T.: Seven-Property-Preserving Iterated Hashing: ROX. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 130\u2013146. Springer, Heidelberg (2007)"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/11935230_20","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"M. Bellare","year":"2006","unstructured":"Bellare, M., Ristenpart, T.: Multi-Property-Preserving Hash Domain Extension and the EMD Transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 299\u2013314. Springer, Heidelberg (2006)"},{"key":"8_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak specifications. Submission to NIST (2008)"},{"key":"8_CR4","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Radiogatun, a belt-and-mill hash function. Presented at Second Cryptographic Hash Workshop, Santa Barbara, August 24-25 (2006), http:\/\/radiogatun.noekeon.org\/"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-78967-3_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"G. Bertoni","year":"2008","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the Indifferentiability of the Sponge Construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 181\u2013197. Springer, Heidelberg (2008)"},{"key":"8_CR6","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge Functions. Presented at ECRYPT Hash Workshop (2007)"},{"key":"8_CR7","unstructured":"Biham, E., Dunkelman, O.: A framework for iterative hash functions: Haifa. In: Second NIST Cryptographic Hash Workshop (2006)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"SAC 2008","author":"C. Bouillaguet","year":"2008","unstructured":"Bouillaguet, C., Fouque, P.-A.: Analysis of radiogatun using algebraic techniques. In: Keliher, L., Avanzi, R., Sica, F. (eds.) SAC 2008. LNCS. Springer, Heidelberg (2008)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - CRYPTO \u201989","year":"1990","unstructured":"Brassard, G. (ed.): CRYPTO 1989. LNCS, vol.\u00a0435. Springer, Heidelberg (1990)"},{"key":"8_CR10","unstructured":"Bresson, E., Canteaut, A., Chevallier-Mames, B., Clavier, C., Fuhr, T., Gouget, A., Icart, T., Misarsky, J.-F., Naya-Plasencia, M., Paillier, P., Pornin, T., Reinhard, J.-R., Thuillet, C., Videau, M.: Shabal \u2013 a submission to advanced hash standard. Submission to NIST (2008)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Claesen, L.J.M., Daemen, J., Genoe, M., Peeters, G.: Subterranean: A 600 mbit\/sec cryptographic vlsi chip. In: ICCD, pp. 610\u2013613 (1993)","DOI":"10.1109\/ICCD.1993.393304"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","year":"2005","unstructured":"Cramer, R. (ed.): EUROCRYPT 2005. LNCS, vol.\u00a03494. Springer, Heidelberg (2005)"},{"key":"8_CR13","unstructured":"Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. PhD thesis, Katholieke Universiteit Leuven (1995)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/3-540-69710-1_5","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1998","unstructured":"Daemen, J., Clapp, C.S.K.: Fast hashing and stream encryption with panama. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol.\u00a01372, pp. 60\u201374. Springer, Heidelberg (1998)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I.: A Design Principle for Hash Functions. In: Brassard [9], pp. 416\u2013427","DOI":"10.1007\/0-387-34805-0_39"},{"key":"8_CR16","unstructured":"Dean, R.D.: Formal aspects of mobile code security. PhD thesis. Princeton University, Princeton (1999)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Fuhr, T., Peyrin, T.: Cryptanalysis of Radiogat\u00fan (2008)","DOI":"10.1007\/978-3-642-03317-9_8"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-540-89255-7_10","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"M. Gorski","year":"2008","unstructured":"Gorski, M., Lucks, S., Peyrin, T.: Slide attacks on hash functions. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 143\u2013160. Springer, Heidelberg (2008)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-28628-8_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"A. Joux","year":"2004","unstructured":"Joux, A.: Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 306\u2013316. Springer, Heidelberg (2004)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/11761679_12","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"J. Kelsey","year":"2006","unstructured":"Kelsey, J., Kohno, T.: Herding Hash Functions and the Nostradamus Attack. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 183\u2013200. Springer, Heidelberg (2006)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B.: Second Preimages on n-Bit Hash Functions for Much Less than 2 $^{\\mbox{n}}$ Work. In: Cramer [12], pp. 474\u2013490","DOI":"10.1007\/11426639_28"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-540-89754-5_5","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"D. Khovratovich","year":"2008","unstructured":"Khovratovich, D.: Two attacks on radiogatun. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 53\u201366. Springer, Heidelberg (2008)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Khovratovich, D.: Cryptanalysis of hash functions with structures. Presented at ECRYPT Hash Workshop (2008)","DOI":"10.1007\/978-3-642-05445-7_7"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-74619-5_3","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"2007","unstructured":"Knudsen, L.R., Rechberger, C., Thomsen, S.S.: The Grindahl Hash Functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 39\u201357. Springer, Heidelberg (2007)"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/11593447_26","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"S. Lucks","year":"2005","unstructured":"Lucks, S.: A Failure-Friendly Design Principle for Hash Functions. In: Roy, B.K. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 474\u2013494. Springer, Heidelberg (2005)"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-540-74143-5_11","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"U.M. Maurer","year":"2007","unstructured":"Maurer, U.M., Tessaro, S.: Domain Extension of Public Random Functions: Beyond the Birthday Barrier. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 187\u2013204. Springer, Heidelberg (2007)"},{"key":"8_CR27","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of applied cryptography. CRC Press, Inc., Boca Raton (1996)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: One Way Hash Functions and DES. In: Brassard [9], pp. 428\u2013446","DOI":"10.1007\/0-387-34805-0_40"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/978-3-540-76900-2_34","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"T. Peyrin","year":"2007","unstructured":"Peyrin, T.: Cryptanalysis of Grindahl. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 551\u2013567. Springer, Heidelberg (2007)"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-45473-X_4","volume-title":"Fast Software Encryption","author":"V. Rijmen","year":"2001","unstructured":"Rijmen, V., Van Rompay, B., Preneel, B., Vandewalle, J.: Producing collisions for panama. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 37\u201351. Springer, Heidelberg (2001)"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","year":"2005","unstructured":"Shoup, V. (ed.): CRYPTO 2005. LNCS, vol.\u00a03621. Springer, Heidelberg (2005)"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions md4 and ripemd. In: Cramer [12], pp. 1\u201318","DOI":"10.1007\/11426639_1"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full sha-1. In: Shoup [31], pp. 17\u201336","DOI":"10.1007\/11535218_2"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Wang, X., Yu, H.: How to break md5 and other hash functions. In: Cramer [12], pp. 19\u201335","DOI":"10.1007\/11426639_2"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Wang, X., Yu, H., Yin, Y.L.: Efficient collision search attacks on sha-0. In: Shoup [31], pp. 1\u201316","DOI":"10.1007\/11535218_1"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03317-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T22:26:22Z","timestamp":1739226382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03317-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033162","9783642033179"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03317-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}